Student's Cybersecurity Awareness in Post Covid
19 Pandemic
1Amelia Setiawan, 2Samuel Wirawan, 3Hamfri Djajakerta, 4Haryanto Haryanto
1,2,3Accounting Department, Faculty of Economics and Business, Parahyangan Catholic University, West Java,Indonesia.
4Accounting Department, Sekolah Tinggi Ilmu Ekonomi Mulia Singkawang, West Kalimantan, Indonesia.
1Orcid: https://orcid.org/0000 0002 9386 7089,
2 Orcid: https://orcid.org/0000 0002 0627 8439,
3Orcid: https://orcid.org/0009 0003 9474 1888,
4Orcid: https://orcid.org/0000 0002 9040 6578
https://doi.org/10.47191/jefms/v6-i10-38
ABSTRACT:
The study used the Theory of Planned Behavior to investigate the relationship between undergraduate accounting students' knowledge of internal control and cyber security and how it impacts their decision-making and behavior. The study was carried out on Indonesian students, and the data was analyzed by regression analysis. The results showed that students' attitudes and perceived behavioral control positively influenced their intention to practice cybersecurity. However, the effect of subjective norms and education on cyber security was insignificant. The four variables studied accounted for 41.2% of the total variance in behavioral intentions. At the same time, other factors contributed to the remaining variance. The findings suggest a need to assess the effectiveness of current cyber security education practices to achieve educational goals better. The negligible impact of the educational variable highlights the necessity of re-evaluating the current approach to cybersecurity education.
KEYWORDS:
attitudes, subjective norms, theory of planned behavior
JEL codes: A100, A110
REFERENCES:
1) ABDELHAMID, M., KISEKKA, V. and SAMONAS, S. (2019). Mitigating e-services avoidance: the role of government cybersecurity preparedness. Information Computer Security, 27(1): 26–46. https://doi.org/10.1108/ICS-02-2018-0024
2) ADDAE, J. H., BROWN, M., SUN, X., TOWEY, D. and RADENKOVIC, M. (2017). Measuring attitude towards personal data for adaptive cybersecurity. Information Computer Security, 25(5): 560–579. https://doi.org/10.1108/ICS-11-2016-0085
3) AKRAMAN, R., CIWAN, C. and PRIYADI, Y. (2018). Pengukuran Kesadaran Keamanan Informasi Dan Privasi Pada Pengguna Smartphone roid Di Indonesia. Jurnal Sistem Informasi Bisnis, 8(2): 115. https://doi.org/10.21456/vol8iss2pp115-122
4) ALAM, M. M., SAID, J. and ABD AZIZ, M. A. (2019). Role of integrity system, internal control system leadership practices on the accountability practices in the public sectors of Malaysia. Social Responsibility Journal, 15(7): 955–976. https://doi.org/10.1108/SRJ-03-2017-0051
5) ALAM, M. Z., KOUSAR, S. and REHMAN, C. A. (2019). Role of entrepreneurial motivation on entrepreneurial intentions behaviour: theory of planned behaviour extension on engineering students in Pakistan. Journal of Global Entrepreneurship Research, 9(1): 1–21. https://doi.org/10.1186/s40497-019-0175-1
6) BOATENG, H. and OKOE, A. F. (2015). Consumers' attitude towards social media advertising their behavioural response: The moderating role of corporate reputation. Journal of Research in Interactive Marketing, 9(4): 299–312. https://doi.org/10.1108/JRIM-01-2015-0012
7) BURNS, S. and ROBERTS, L. (2013). Applying the Theory of Planned Behaviour to predicting online safety behaviour. Crime Prevention Community Safety, 15(1): 48–64. https://doi.org/10.1057/cpcs.2012.13
8) CAMARA, S. K., ENG-ZISKIN, S., WIMBERLEY, L., DABBOUR, K. S. and LEE, C. M. (2017). Predicting Students' Intention to Plagiarize: an Ethical Theoretical Framework. Journal of Academic Ethics, 15(1): 43–58. https://doi.org/10.1007/s10805-016-9269-3
9) CURRAS-PEREZ, R., RUIZ-MAFE, C. and SANZ-BLAS, S. (2014). Determinants of user behaviour recommendation in social networks: An integrative approach from the uses gratifications perspective. Industrial Management Data Systems, 114(9): 1477–1498. https://doi.org/10.1108/IMDS-07-2014-0219
10) DOHERTY, N. F. and TAJUDDIN, S. T. (2018). Towards a user-centric theory of value-driven information security compliance. Information Technology People, 31(2): 348–367. https://doi.org/10.1108/ITP-08-2016-0194
11) DWI S, H., SUMARDININGSIH, S., RESPATI, D. and WIDIATMONO, R. (2013). Efektivitas Pembimbingan Karya Tulis Online Melalui Website KTI. Jurnal Kependidikan: Penelitian Inovasi Pembelajaran, 43: 116–123.
12) FERNÁNDEZ-CRUZ, F. J. and FERNÁNDEZ-DÍAZ, M. J. (2016). Generation z's teachers their digital skills. Comunicar, 24(46): 97–105. https://doi.org/10.3916/C46-2016-10
13) FOLTZ, C. B., NEWKIRK, H. E. and SCHWAGER, P. H. (2016). An Empirical Investigation of Factors that Influence Individual Behavior toward Changing Social Networking Security Settings. Journal of Theoretical Applied Electronic Commerce Research, 11(2): 2–2. https://doi.org/10.4067/S0718-18762016000200002
14) FOTH, M. (2016). Factors influencing the intention to comply with data protection regulations in hospitals: Based on gender differences in behaviour deterrence. European Journal of Information Systems, 25(2): 91–109. https://doi.org/10.1057/ejis.2015.9
15) FU, X. and JUAN, Z. (2017). Understing public transit use behavior: integration of the theory of planned behavior the customer satisfaction theory. Transportation, 44(5): 1021–1042. https://doi.org/10.1007/s11116-016-9692-8
16) GÓMEZ, M. DEL C. O., CORDERO, R. L. and MOH, L. M. (2019). Religion Sex as Factors of Individual Differences of Reification in an Intercultural-Community-Based Society. Religions, 10(L621): 1–15. https://doi.org/10.3390/rel10110621
17) HADAD, S. (2019). Challenges for Banking Services in the Knowledge Economy. Management Dynamics in the Knowledge Economy, 7(3): 337–352. https://doi.org/10.25019/MDKE/7.3.04
18) HUSSEIN, R. and HASSAN, S. (2017). Customer engagement on social media: How to enhance continuation of use. Online Information Review, 41(7):1006–1028. https://doi.org/10.1108/OIR-02-2016-0047
19) HWANG, I., KIM, D., KIM, T. and KIM, S. (2017). Why not comply with information security? An empirical approach for the causes of non-compliance. Online Information Review, 41(1): 2–18. https://doi.org/10.1108/OIR-11-2015-0358
20) INTERNATIONAL FEDERATION OF ACCOUNTANTS. (2019). Hbook of International Education Pronouncements.
21) IOVAN, S. and IOVAN, A.-A. (2016). From Cyber Threats To Cyber-Crime. Journal of Information Systems andOperations Management, 425–434.
22) ISACA. (2015). Cybersecurity Fundamental. ISACA Elsevier: 1–196). https://doi.org/10.1016/B978-0-08-026495-0.50007-7
23) JANG, Y.-T., CHANG, S. E. and CHEN, P.-A. (2015). Exploring social networking sites for facilitating multi-channel retailing. Multimedia Tools Applications, 74(1): 159–178. https://doi.org/10.1007/s11042-013-1430-z
24) KARLSSON, M., DENK, T. and ÅSTRÖM, J. (2018). Perceptions of organizational culture value conflicts in information security management. Information Computer Security, 26(2): 213–229. https://doi.org/10.1108/ICS-08-2017-0058
25) KAYES, I. and IAMNITCHI, A. (2017). Privacy security in online social networks: A survey. Online Social Networks Media, 3–4(April 2015): 1–21. https://doi.org/10.1016/j.osnem.2017.09.001
26) KENNEDY, S. E. (2016). The pathway to security – mitigating user negligence. Information andComputer Security, 24(3): 255–264. https://doi.org/10.1108/ICS-10-2014-0065
27) LEBEK, B., UFFEN, J., NEUMANN, M., HOHLER, B. and H. BREITNER, M. (2014). Information security awareness behavior: a theory-based literature review. Management Research Review, 37(12): 1049–1092. https://doi.org/10.1108/MRR-04-2013-0085
28) LEWIS, P. C. J. (2020). Class Action Trends Report, Summer 2020: Class Action Risks in a Pemic. Labor Law Journal, 71(3): 165–177.
29) LIN, K. Y. and LU, H. P. (2015). Predicting mobile social network acceptance based on mobile value social influence. Internet Research, 25(1):107–130. https://doi.org/10.1108/IntR-01-2014-0018
30) LIOU, D. K., CHIH, W. H., HSU, L. C. and HUANG, C. Y. (2016). Investigating information sharing behavior: the mediating roles of the desire to share information in virtual communities. Information Systems E-Business Management, 14(2):187–216. https://doi.org/10.1007/s10257-015-0279-2
31) NATAWIDJAJA, V. (2018). The Effect of Leadership Style, Organizational Culture, Motivation The Principles's Performance Level of Junior High School. Jurnal Kependidikan: Penelitian Inovasi Pembelajaran, 2(2):262–273. https://doi.org/10.21831/jk.v2i2.9430
32) NIETO, A. and RIOS, R. (2019). Cybersecurity profiles based on human-centric IoT devices. Human-Centric Computing Information Sciences, 9(1). https://doi.org/10.1186/s13673-019-0200-y
33) NURWANAH, A., T., S., ROSIDI, R. and ROEKHUDIN, R. (2018). Determinants of tax compliance: theory of planned behavior stakeholder theory perspective. Problems Perspectives in Management, 16(4):395–407. https://doi.org/10.21511/ppm.16(4).2018.33
34) PHAM, H. C., BRENNAN, L. and RICHARDSON, J. (2017). Review of Behavioural Theories in Security Compliance Research Challenges. Proceedings of the Informing Science Information Technology Education Conference, 3722: 65–76.
35) RAFIQUE, G. M. (2017). Personal Information Sharing Behavior of University Students via Online Social Networks. Library Philosophy Practice, February.
36) RAJPUT, H. (2015). Social Networking Sites Continuance: An Application of Extended Theory of Planned Behaviour. Telecom Business Review, 8(1). https://doi.org/10.21863/tbr/2015.8.1.006
37) SALAHDINE, F. and KAABOUCH, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4). https://doi.org/10.3390/FI11040089
38) SAPTONO, L. and BRATANINGRUM, N. P. (2019). The Development of Role-Playing learning Model Design on Accounting Subject. Jurnal Kependidikan: Penelitian Inovasi Pembelajaran, 3(2): 156–171. https://doi.org/10.21831/jk.v3i2.21312
39) SASSON, H. and MESCH, G. (2016). Gender Differences in the Factors Explaining Risky Behavior Online. Journal of Youth Adolescence, 45(5):973–985. https://doi.org/10.1007/s10964-016-0465-7
40) SIHOMBING, S. O. (2019). Analysis of the Relationship Between Image, Social Media, Attitude to Predict Intention to Choose: An Empirical Investigation of Presidential Election in Indonesia. International Review of Management Marketing, 9(5): 9–16. https://doi.org/10.32479/irmm.8386
41) SIHOMBING, S. O. (2017). Predicting intention to share news through social media: An empirical analysis in Indonesian youth context. Business Economic Horizons, 13(4): 468–477. https://doi.org/10.15208/beh.2017.32
42) SINGH, S. and SRIVASTAVA, R. K. (2018). Predicting the intention to use mobile banking in India. International Journal of Bank Marketing, 36(2), 357–378. https://doi.org/10.1108/IJBM-12-2016-0186
43) SITANGGANG, N. and LUTHAN, P. L. A. (2018). The Effects of Emotional Knowledge, Emotional Reconciliation, Emotional Authenticity on the Students' Emotional Spirituality. Jurnal Kependidikan: Penelitian Inovasi Pembelajaran, 2(1): 167–180. https://doi.org/10.21831/jk.v2i1.13722
44) SOMMESTAD, T., KARLZÉN, H. and HALLBERG, J. (2019). The Theory of Planned Behavior Information Security Policy Compliance. Journal of Computer Information Systems, 59(4):344–353. https://doi.org/10.1080/08874417.2017.1368421
45) STANCIU, V. and TINCA, A. (2016). Students' awareness on information security between own perception reality – an empirical study. Accounting Management Information Systems, 15(1): 112–130.
46) SURIFAH, MUSTIATI, E., SYAIFULLAH, M. Z. and BOWO, A. N. A. (2016). Pengaruh Motivasi terhadap Minat mahasiswa Mengikuti Pendidikan Profesi Akuntansi. Jurnal Kependidikan: Penelitian Inovasi Pembelajaran, 46(2): 246–258.
47) SYIFA, F. and MOCHAMAD, B, T. (2020). Pembelajaran Teknologi Informasi Dan Komunikasi Ditinjau Dari Minat Belajar. Jurnal Kependidikan, 4(2): 256–268. https://doi.org/https://doi.org/10.21831/jk.v4i2.24418
48) TANANTAPUTRA, J., CHONG, C. W. and RAHMAN, M. S. (2017). Influence of individual factors on concern for information privacy (CFIP), a perspective from Malaysian higher educational students. Library Review, 66(4–5): 182–200. https://doi.org/10.1108/LR-05-2016-0043
49) VARGO, D., ZHU, L., BENWELL, B. and YAN, Z. (2020). Digital technology use during COVID-19 pemic: A rapid review. Human Behavior Emerging Technologies, August, 1–13. https://doi.org/10.1002/hbe2.242
50) WEINBERGER, M., ZHITOMIRSKY-GEFFET, M. and BOUHNIK, D. (2017). Factors Affecting Users' Online Privacy Literacy Among Students in Israel. Online Information Review, 41(5): 655–671. https://doi.org/10.1108/OIR-05-2016-0127